首页 | 本学科首页   官方微博 | 高级检索  
     

基于混沌和图像内容的脆弱水印方案
引用本文:陈帆,朱大勇,许毅.基于混沌和图像内容的脆弱水印方案[J].计算机应用,2005,25(9):2151-2154.
作者姓名:陈帆  朱大勇  许毅
作者单位:西南交通大学,计算机与通信工程学院,四川,成都,610031;电子科技大学,计算机科学与工程学院,四川,成都,610054
摘    要:针对脆弱水印方案的“伪认证攻击”问题,提出了基于混沌和图像内容的脆弱水印方案。该方案基于矩阵奇异值的特性,选取与图像内容密切相关的图像矩阵奇异值作为水印,并用混沌系统对其加密增强水印的安全性。认证时通过水印差别图和奇异值差值双重比较来抵抗简单脆弱水印嵌入方法的“伪认证攻击”。理论分析和仿真实验表明:该算法能有效地抵抗“伪认证攻击”,具有更好的安全性能。

关 键 词:图像认证  混沌  奇异值分解  脆弱水印
文章编号:1001-9081(2005)09-2151-04
收稿时间:2005-03-07
修稿时间:2005-03-072005-07-27

Novel fragile watermark technique based on chaos and image content
CHEN Fan,ZHU Da-yong,XU Yi.Novel fragile watermark technique based on chaos and image content[J].journal of Computer Applications,2005,25(9):2151-2154.
Authors:CHEN Fan  ZHU Da-yong  XU Yi
Affiliation:1.School of Computer & Communication Engineering,Southwest Jiaotong University,Chengdu Sichuan 610031,China;2.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu Sichuan 610054,China
Abstract:To overcome weU-connected attack in fragile watermarking, a novel fragile watermarking method based on chaotic system and image content was proposed. Based on the character of matrix singular values, singular values of image matrix were converted into a binary sequence as the watermark to be embedded. To improve watermark security, a chaotic system was applied to encrypt the watermark sequence. Then with the general fragile watermarking method, the tampered area of the watermarked image could be reflected in the watermarking difference map and singular values difference to improve the resistance to weU-connected attack. Theoretic analysis and simulation results show that the proposed algorithm is effectively resistance to well-connected attack and more secure.
Keywords:image authentication  chaos  singular value decomposition  fragile watermark
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号